Fraud Workshop Finding the truth in the transactions



Similar documents
ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

Using Technology to Automate Fraud Detection Within Key Business Process Areas

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Data Analytics For the Restaurant Industry

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

by: Scott Baranowski, CIA

Invoice Number Vendor Number Amount A $1, A $1,035.71

An Auditor s Guide to Data Analytics

Using T Accounts to post journal entries

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

ACL Command Reference

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Advanced Data Analytics, the Fraudsters Worst Enemy

Comparison of Generalized Audit Software

Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver

Accounts Payable Fraud Services

Final. Internal Audit Report. Creditors System

Why is Internal Audit so Hard?

White Paper. 10 Ways to Prevent Business Expense Fraud and Abuse

Credit cards must only be used for GLA business, they should not be used for private expenditure

Contents. xiii xv. Case Studies Preface

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data analysis for Internal Audit

Audit Program for Accounts Payable and Purchases

Fraud Detection & Data Analytics

Current Uses and Trends in ACL and Data Mining

3. Current Auditing Computerized Tools

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

Leveraging Data Analytics in Audits and Investigations

P-Card Fraud Controls. Introduction

Internal Audit Tools. Selected Add-ins and Utility Programs for Increasing Audit Effectiveness and Efficiency

Welcome to the topic on managing delivery issues with Goods Receipt POs.

Controls should be appropriate to the scale of the assets at risk and the potential loss to the University.

SUGGESTED CONTROLS TO MITIGATE THE POTENTIAL RISK (Internal Audit)

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6

Dan French Founder & CEO, Consider Solutions

Accounts Payable Best Practices

MANUAL AUDIT SAMPLING

INFORMATION TECHNOLOGY SECURITY STANDARDS

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

Supplier Portal. Date: January 24, Purpose: Reference material for use by the Suppliers when reviewing settlement invoices.

Automating the Audit July 2010

Real life experiences with Continuous Controls Monitoring (CCM) on Master Data. Pat Culpan Jeet Kadam

AUDIT REPORT INTERNAL AUDIT DIVISION. Invoice Processing in UNAMID. Internal controls over invoice processing were inadequate and ineffective

AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM

Continuous Auditing with Data Analytics

February 2, 2012 ACCOUNTS PAYABLE BEST PRACTICES

THE ABC S OF DATA ANALYTICS

EXFLOW NAV BROCHURE INCREASE PRODUCTIVITY IN YOUR AP DEPARTMENT LEVERAGE YOUR DYNAMICS NAV INVESTMENT WITH INDUSTRY BEST PRACTICE AP AUTOMATION

Internal Control Deliverables. For. System Development Projects

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Microsoft Confidential

In search of Excellence Series Research - Study Material No. 18

Mango s Health Check. How healthy is financial management in your not-for-profit organisation?

Training Guide: Customers CRM. Version 001. Training Prerequisite: Basic System Knowledge

WHITE PAPER HOW TO REDUCE RISK, ERROR, COMPLEXITY AND DRIVE COSTS IN THE ACCOUNTS PAYABLE PROCESS

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013

Accounts Payable Automation

Auditing E-Business: Challenges and Opportunities

Better Business Through Data Analysis & Monitoring

B Resource Guide: Implementing Financial Controls

Using Data Analytics to Detect Fraud

Great Aycliffe Town Council. Purchase Ordering and Payment for Goods and Services Policy

Leverage T echnology: Move Your Business Forward

Fraud data interrogation tools: COMPARING BEST SOFTWARE FOR FRAUD EXAMINATIONS

The course breaks down the Procurement Process into 5 Steps

Copyright 2006 ACL Services Ltd. All rights reserved.

An Introduction to Continuous Controls Monitoring

1. Is it required that each company that bids on this RFP be pre-registered or pre-qualified prior to bidding?

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Expense Reports Training Document. Oracle iexpense

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Payment Procedures. Corruption Prevention Department

Global E-Business and Collaboration

City of Berkeley. Accounts Payable Audit

Multi Channel Invoice Processing the way forward

Inventory Control System Administration Manual

Sage ERP I White Paper. An ERP Guide to Driving Efficiency

Leveraging Big Data to Mitigate Health Care Fraud Risk

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT

How To Protect Decd Information From Harm

[1] Viewing invoice details:

Internal Controls, Fraud Detection and ERP

Premium Audit Guide. What is a premium audit? Types of audits. Payroll as a premium basis. Information requested at time of audit

Great Expectations : How to Detect and Prevent Fraud using Data Analysis

1 (a) Audit strategy document Section of document Purpose Example from B-Star

White Paper - Travel & Entertainment Spend Analytics Best Practices

Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Transcription:

Your Trusted Partner for Audit Analytics Fraud Workshop Finding the truth in the transactions Copyright 2011 ACL Services Ltd. Robin Clough, ACDA ACL Certified Trainer

Copyright 2011 ACL Services Ltd. 2 Your Trusted Partner for Audit Analytics Presenter Agenda ACL and fraud detection Creating a fraud detection program Features in ACL that can assist with fraud detection Sample analytics / Analytics in AX Questions

Copyright 2011 ACL Services Ltd. 3 ACL and fraud detection

Copyright 2011 ACL Services Ltd. 4 ACL and fraud detection Trawl large volumes of data Evidence could be hidden behind millions of transactions Don t rely on lottery approach, focus on 100% of the transactions Use ACL profiling commands to find trends/outliers Use ACL filtering to home in on unusual transactions

Copyright 2011 ACL Services Ltd. 5 ACL and fraud detection Span more than one dataset Bring several sets of data into the analysis from different systems Use ACL combining commands to cross compare data

Copyright 2011 ACL Services Ltd. 6 ACL and fraud detection Use a continuous approach Look at implementing AX Fraud occurs on an ongoing basis Run analytics on a regular basis Ensure results are reviewed Exception Ensure analytics are kept fresh and current

Copyright 2011 ACL Services Ltd. 7 Creating a fraud detection program

Copyright 2011 ACL Services Ltd. 8 Creating a fraud detection program Build a profile of potential frauds Identify high risk areas Look at historical fraud Inside/outside organisation What s happening elsewhere media, industry groups

Copyright 2011 ACL Services Ltd. 9 Creating a fraud detection program Develop analytics to look for possible indicators of fraud Use full breath of ACL features Convert to scripts Refine and repeat over time

Copyright 2011 ACL Services Ltd. 10 Creating a fraud detection program Improve controls by implementing continuous controls monitoring Don t wait too long to detect the fraud it could be too late Best caught in early stage before real damage is done

Copyright 2011 ACL Services Ltd. 11 Features in ACL that can assist with Fraud Detection

Copyright 2011 ACL Services Ltd. 12 Features in ACL that can assist with Fraud Detection STATISTICS Command Gives averages, value or date spans Lots of values stored as variables that could be used in filters and scripts

Copyright 2011 ACL Services Ltd. 13 Features in ACL that can assist with Fraud Detection DUPLICATES Command Easy to use, key is in selection of data and computed fields Common application is in analysis of duplicate payments Suppliers may be deliberately double invoicing to exploit control weaknesses Could also be collusion between AP and Suppliers

Copyright 2011 ACL Services Ltd. 14 Features in ACL that can assist with Fraud Detection CLASSIFY / SUMMARIZE Commands Great for spanning large datasets and seeing the data in a concise way Take vendor creation/modification Is the role of K_DUDAK really to create/modify vendors? Why blanks? Use in combination with AVERAGE1 variable generated by STATISTICS Set tolerance boundaries e.g. 20% below AVERAGE1 Sometimes good to view graphically also

Copyright 2011 ACL Services Ltd. 15 Features in ACL that can assist with Fraud Detection STRATIFY Command Good way to quickly see outliers in a large population of numbers Could be used when viewing expenses

Copyright 2011 ACL Services Ltd. 16 Features in ACL that can assist with Fraud Detection FIND Function Easy to locate key strings of data in large data sets Is not case sensitive and also looks within strings Famous Gym/Taxi scam

Copyright 2011 ACL Services Ltd. 17 Features in ACL that can assist with Fraud Detection BENFORD Command Probability theorem that makes predictions about distribution of digits in numerical data Can detect hidden trends occurring in the data Looks at first few digits of numbers and attempts to predict expected distribution Used frequently to detect spending just below authorisation levels Always worth running to see what it comes up with anything

Copyright 2011 ACL Services Ltd. 18 Features in ACL that can assist with Fraud Detection BENFORD Command

Copyright 2011 ACL Services Ltd. 19 Features in ACL that can assist with Fraud Detection FILTERS Allows you to home in on transactions that meet certain conditions Quick filter allows expressions to be built quickly with no syntax errors Use variables and functions to make your filters powerful Any guesses as to what this filter is doing?

Copyright 2011 ACL Services Ltd. 20 Features in ACL that can assist with Fraud Detection COMPUTED FIELDS / WORKSPACES Add your own fields to existing data fields Confirm accuracy of calculations Store filters as logical computed fields i.e. T or F For widely used computed fields think about using Workspaces

Copyright 2011 ACL Services Ltd. 21 Features in ACL that can assist with Fraud Detection SCRIPTS Why reinvent the wheel every time? Share/swap your scripts with your friends! Easier than you think to create recorder, log entries, create script from table history What s this script doing?

Copyright 2011 ACL Services Ltd. 22 Sample Analytics

Copyright 2011 ACL Services Ltd. 23 Sample Analytics Purchase to Pay Split purchases Inflated prices (collusion) Duplicate payments Appropriate authorisation Invoice amount doesn t match PO amount

Copyright 2011 ACL Services Ltd. 24 Sample Analytics Purchase to Pay Cross check between employees/contractors and suppliers Check key information is not fictitious e.g. address details, VAT number Segregation of duty analysis roles matrix Vendor creation and modification

Copyright 2011 ACL Services Ltd. 25 Sample Analytics Purchase cards Merchant profiling Personal use e.g. holiday travel instead of business travel! Weekend use, outside business hours Split purchases (Benford) Peer group comparison Restricted merchants

Copyright 2011 ACL Services Ltd. 26 Sample Analytics Travel and entertainment expenses Duplicate claims No receipts Inappropriate use Wrong rates Policy breach e.g. business travel v economy travel, meal allowance exceeded Peer group comparison Authorisation checks Benford

Copyright 2011 ACL Services Ltd. 27 Sample Analytics Journals Raised during non working days or hours Isolate manual journals Created by senior management Large amounts / Small amounts Round sum amounts Benford analysis

Copyright 2011 ACL Services Ltd. 28 Sample Analytics Others Timesheet/Swipe card analysis Point of Sale analysis Stock levels/wastage levels

Copyright 2011 ACL Services Ltd. 29 Analytics in AX

Copyright 2011 ACL Services Ltd. 30 Questions?